Illegal downloads: Being able to tie media downloads to individuals is key not only to retain productivity (and server space!) but also to meet compliance needs. Any organization where such activity is happening ends up liable, and the MPAA and RIAA are adamant about enforcing copyright violations. Given the chance to link download traffic to a specific user, IT can go to that user and reiterate the Internet usage policies, possibly saving a friend's job or a student's enrollment.
The changes in business practices I mentioned previously are happening very quickly, and IT must be able to tie traffic to user names. This facility is critical for enforcing access policies, achieving enforcement, satisfying compliance demands, meeting industry audits, and ensuring employee productivity. That level of visibility in the LAN is essential for IT to control what users can do on the LAN, because you can't control what you can't see.
So for a variety of reasons-data protection, employee productivity, simplified IT operations, and perhaps someone's job-IT should look for ways to more clearly know the identity of the users on the LAN and the full range of applications in use. Whatever the mechanism, IT will reap many rewards from identity-based user and application control.
Jeff Prince is chairman and CTO of ConSentry Networks.
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.